Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

For many years the defense and intelligence communities have relied upon a concept called gamification to test concepts, strategies, and potential outcomes in various scenarios via computer simulation. They have found that gamification heightens interest of the players involved and serves as a stimulus for creativity and interchange of ideas which is vital for keeping an edge. As computers have… Read more

Tags: infosec, gamification

verb (used with object), optimized, optimizing.1. to make as effective, perfect, or useful as possible. 2. to make the best of.Breaches continue, attacks are on the rise, and people responsible for security wake up in a cold sweat a few times a year worried they’re the next victims.While ‘fixing’ security in totality is a topic… Read more


The art of detecting vulnerabilities within the enterprise environment has been around for some time. Vulnerability scanning and management technologies and methodologies have evolved (sometimes rather quietly) to meet customer demands, which are fuelled by compliance and regulatory requirements.In simple terms, vulnerability scanning is to look for vulnerabilities within an environment.As an example, let’s use a… Read more

Tags: vulnerability scanning, vulnerability management

In recent years, many virtual column inches have been dedicated to discussing the cyber security skills gap. According to the Global Information Security Workforce Study (GISWS) by Frost & Sullivan for the (ISC)2 foundation, a shortfall of 1.5 million security professionals is forecast by 2020. These are large numbers, but it’s important to remember that skills shortages and surpluses aren… Read more

Tags: infosec, skills

We’ve got the weeks’ news covered for you.Links to stories in the videoThe beginning of the end(point): where we are now and where we’ll be in five years The strange way people perceive privacy online Tesla responds to Chinese hack with a major security upgrade Good cybersecurity can be good marketing Cyber:… Read more


Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content